CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

36 Chapter 2 ■ Asset Security (Domain 2)



  1. Chris is responsible for his organization’s security standards and has guided the selection
    and implementation of a security baseline for Windows PCs in his organization. How
    can Chris most effectively make sure that the workstations he is responsible for are being
    checked for compliance and that settings are being applied as necessary?
    A. Assign users to spot-check baseline compliance.
    B. Use Microsoft Group Policy.
    C. Create startup scripts to apply policy at system start.
    D. Periodically review the baselines with the data owner and system owners.

  2. What term is used to describe a set of common security configurations, often provided by
    a third party?
    A. Security policy
    B. Baseline
    C. DSS
    D. NIST SP 800-53

  3. What type of policy describes how long data is retained and maintained before
    destruction?
    A. Classification
    B. Audit
    C. Record retention
    D. Availability

  4. Which attack helped drive vendors to move away from SSL toward TLS-only by default?
    A. POODLE
    B. Stuxnet
    C. BEAST
    D. CRIME

  5. What security measure can provide an additional security control in the event that backup
    tapes are stolen or lost?
    A. Keep multiple copies of the tapes.
    B. Replace tape media with hard drives.
    C. Use appropriate security labels.
    D. Use AES-256 encryption.

Free download pdf